Event

The Next Identity Frontier: Navigating from Human Users to Agentic AI

showcase week webinars on demandemerging threatson demand webinarsupcominggovernanceai
Date and Time 20th May 2026 , 11:00am to 12:00pm BST
Location Online
Array
Be part of the ISF Cyber Security Showcase Week

Registration takes place on another website

Enterprise technology is undergoing a seismic shift. The move to the cloud was just the beginning; leaders are now facing the explosion of autonomous tools and agentic AI. As this digital complexity grows, so does a critical security gap. Recent industry analysis reveals a staggering 1,140% surge in access requests, pushing traditional, manual governance models to the breaking point.

This session unpacks the challenges and strategic decisions that security leaders must confront. We will explore recent industry data to address a critical question: Is your organisation’s identity strategy prepared for the operational realities of AI at scale? We will examine the core principles of NIST’s identity maturity and discuss the trade-offs involved in evolving from a fragmented security posture to a more cohesive approach, enabling the agility required to adapt as new technologies emerge.

Join Candice Samons, Product Marketing Manager – EMEA, Okta as she explores:

  • The widening phishing gap: Examining why identity-based threats are outpacing the adoption of phishing-resistant authentication by a factor of six, and discussing the strategic imperatives for closing this gap.
  • Governance beyond the breaking point: Analysing the limitations of manual certification in the face of machine-scale access requests and exploring the shift toward policy-driven governance.
  • The AI & identity symbiosis: Debating the proposition that “AI readiness is identity readiness.” We will explore how an organisation’s approach to non-human identity management can either accelerate or inhibit the secure, scaled deployment of AI.
  • Conceptualising non-human identities: Delving into the critical questions leaders must ask: Where are our non-human agents? What can they connect to? And what actions can they perform?
Be part of the ISF Cyber Security Showcase Week

Registration takes place on another website